CompTIA N10-009 Practice Test

Prepare smarter and boost your chances of success with our CompTIA N10-009 Practice test. This test helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use N10-009 practice exam are 40–50% more likely to pass on their first attempt.

Start practicing today and take the fast track to becoming CompTIA N10-009 certified.

12400 already prepared
Updated On : 30-Jun-2025
240 Questions
4.8/5.0

Page 10 out of 24 Pages

Which of the following is a characteristic of the application layer?

A. It relies upon other layers for packet delivery. O

B. It checks independently for packet loss.

C. It encrypts data in transit.

D. It performs address translation.


A.   It relies upon other layers for packet delivery. O
B.    It checks independently for packet loss.

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

A. Extranet

B. Trusted

C. VPN

D. Public


B.   Trusted

Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?

A. MTTR

B. MTBF

C. RPO

D. RTO


B.   MTBF

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

A. SSO

B. SAML

C. MFA

D. RADIUS


D.   RADIUS

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

A. NTP

B. DNS

C. LDAP

D. DHCP


A.   NTP

Which of the following most likely determines the size of a rack for installation?

A. KVM size

B. Switch depth

C. Hard drive size

D. Cooling fan speed

E. Outlet amperage

F. Server height


B.   Switch depth

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

A. IAM

B. MFA

C. RADIUS

D. SAML


D.   SAML

Which of the following is the next step to take after successfully testing a root cause theory?

A. Determine resolution steps.

B. Duplicate the problem in a lab.

C. Present the theory for approval.

D. Implement the solution to the problem.


A.   Determine resolution steps.

A virtual machine has the following configuration:

•IPv4 address: 169.254.10.10
•Subnet mask: 255.255.0.0

The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?

A. Thesubnet mask is incorrect.

B. TheDHCP server is offline.

C. TheIP address is an RFC1918 private address.

D. TheDNS server is unreachable.


B.   TheDHCP server is offline.

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

A. Port

B. DNS

C. MAC

D. Content


D.   Content

Page 10 out of 24 Pages
N10-009 Practice Test Previous